{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:24:53Z","timestamp":1742977493967,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319200330"},{"type":"electronic","value":"9783319200347"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20034-7_13","type":"book-chapter","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T19:25:48Z","timestamp":1433359548000},"page":"129-133","source":"Crossref","is-referenced-by-count":4,"title":["Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking"],"prefix":"10.1007","author":[{"given":"Mattijs","family":"Jonker","sequence":"first","affiliation":[]},{"given":"Anna","family":"Sperotto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Addley, E., Halliday, J.: WikiLeaks supporters disrupt Visa and MasterCard sites in \u2018Operation Payback\u2019s, \n                      \n                        http:\/\/www.theguardian.com\/world\/2010\/dec\/08\/wikileaks-visa-mastercard-operation-payback\/\n                      \n                      \n                     (accessed on January 13, 2015)"},{"key":"13_CR2","unstructured":"Greenberg, A.: WikiLeaks Supporters Aim Cyberattacks At PayPal, \n                      \n                        http:\/\/www.forbes.com\/sites\/andygreenberg\/2010\/12\/06\/wikileaks-supporters-aim-cyberattacks-at-paypal\/\n                      \n                      \n                     (accessed on January 13, 2015)"},{"key":"13_CR3","unstructured":"Markoff, J., Pelroth, N.: Firm Is Accused of Sending Spam, and Fight Jams Internet, \n                      \n                        http:\/\/www.nytimes.com\/2013\/03\/27\/technology\/internet\/online-dispute-becomes-internet-snarling-attack.html?_r=0\n                      \n                      \n                     (accessed on January 13, 2015)"},{"key":"13_CR4","unstructured":"Musil, S.: Record-breaking DDoS attack in Europe hits 400Gbps, \n                      \n                        http:\/\/www.cnet.com\/news\/record-breaking-ddos-attack-in-europe-hits-400gbps\/\n                      \n                      \n                     (accessed on January 13, 2015)"},{"key":"13_CR5","unstructured":"Olson, P.: The Largest Cyber Attack In History Has Been Hitting Hong Kong Sites, \n                      \n                        http:\/\/www.forbes.com\/sites\/parmyolson\/2014\/11\/20\/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites\/\n                      \n                      \n                     (accessed on January 13, 2015)"},{"issue":"4","key":"13_CR6","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TCOM.1980.1094702","volume":"28","author":"H. Zimmermann","year":"1980","unstructured":"Zimmermann, H.: OSI reference model\u2013The ISO model of architecture for open systems interconnection. IEEE Transactions on Communications\u00a028(4), 425\u2013432 (1980)","journal-title":"IEEE Transactions on Communications"},{"key":"13_CR7","unstructured":"Karami, M., McCoy, D.: Understanding the Emerging Threat of DDoS-as-a-Service. In: Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET 2013 (2013)"},{"key":"13_CR8","unstructured":"Prolexic, A.: Prolexic: DDoS Protection and Mitigation, \n                      \n                        http:\/\/www.prolexic.com\/\n                      \n                      \n                     (accessed on January 13, 2015)"},{"key":"13_CR9","unstructured":"CloudFlare: CloudFlare: The web performance & security company, \n                      \n                        http:\/\/www.cloudflare.com\/\n                      \n                      \n                     (accessed on January 13, 2015)"},{"key":"13_CR10","unstructured":"Verisign: Verisign: Internet Security and Web Domain Names, \n                      \n                        http:\/\/www.verisigninc.com\/\n                      \n                      \n                     (accessed on January 13, 2015)"},{"key":"13_CR11","unstructured":"Shenker, S., Casado, M., Koponen, T., McKeown, N.: The future of networking, and the past of protocols, Presented at the Open Networking Summit (2011)"},{"key":"13_CR12","unstructured":"Bezerra, J.A.: Migrating AmLight from legacy to SDN: Challenges, Results and Next Step, Presented at NANOG 63 (2015)"},{"issue":"2","key":"13_CR13","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N. McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: OpenFlow: enabling innovation in campus network. ACM SIGCOMM Computer Communication Review\u00a038(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois, J., Dolberg, L., Festor, O., Engel, T.: Network Security through Software Defined Networking: a Survey. In: Proceedings of the 7th ACM Conference on Principles, Systems and Applications of IP Telecommunications, IPTComm 2014 (2014)","DOI":"10.1145\/2670386.2670390"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-662-43862-6_15","volume-title":"Monitoring and Securing Virtualized Networks and Services","author":"M. Vizv\u00e1ry","year":"2014","unstructured":"Vizv\u00e1ry, M., Vykopal, J.: Future of DDoS Attacks Mitigation in Software Defined Networks. In: Sperotto, A., Doyen, G., Latr\u00e9, S., Charalambides, M., Stiller, B. (eds.) AIMS 2014. LNCS, vol.\u00a08508, pp. 123\u2013127. Springer, Heidelberg (2014)"},{"issue":"7","key":"13_CR16","first-page":"36","volume":"51","author":"S. Sezer","year":"2013","unstructured":"Sezer, S., Scott-Hayward, S., Kaur, P.C., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Miller, M., Roa, N.: Are We Ready for SDN? Implementation Challenges for Software-Defined Networks. ACM SIGCOMM Computer Communication Review\u00a051(7), 36\u201343 (2013)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (2013)","DOI":"10.1145\/2491185.2491199"},{"key":"13_CR18","unstructured":"Juniper: Junos OS: Network operating system for routing, switching, and security, \n                      \n                        http:\/\/www.juniper.net\/us\/en\/products-services\/nos\/junos\/\n                      \n                      \n                     (accessed on January 22, 2015)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Mechanisms for Network Configuration and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20034-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T20:08:54Z","timestamp":1559938134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20034-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319200330","9783319200347"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20034-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}